Abstract:
A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of retrieving a list of group policy objects for a domain, generating a configuration initialization file including a domains section identifying a plurality of domains that are to be backed up and a setup section specifying a plurality of values that control the backup of each policy object in each domain, determining a digital signature for each policy object on a list of policies for the domain, comparing the digital signature for each policy object with a corresponding previous digital signature for each policy, determining if a current digital signature for each policy object matches the corresponding previous digital signature for a policy, and backing up a policy object having a current digital signature that does not match the corresponding previous digital signature.
Abstract:
A method, system and program product for group policy backup management in a network having a plurality of domains including components and modules for steps of retrieving a list of group policy objects for a domain, generating a configuration initialization file including a domains section identifying a plurality of domains that are to be backed up and a setup section specifying a plurality of values that control the backup of each policy object in each domain, determining a digital signature for each policy object on a list of policies for the domain, comparing the digital signature for each policy object with a corresponding previous digital signature for each policy, determining if a current digital signature for each policy object matches the corresponding previous digital signature for a policy, and backing up a policy object having a current digital signature that does not match the corresponding previous digital signature.
Abstract:
A method, system and program product for group policy backup management in an enterprise network having a plurality of domains. A list of group policies for a domain is retrieved and a digital signature is determined for each policy on the list of policies for the domain. The digital signature for each policy in the domain is compared with a corresponding previous digital signature for the same policy. If the current digital signature for each policy matches the corresponding previous digital signature for the same policy, no backup is performed. Each policy having a current digital signature that does not match the corresponding previous digital signature for the same policy is backed up. The preceding steps are repeated for each domain in a plurality of domains within the enterprise network computing environment. Individual policies can also be backed up or restored upon user request. The system contains a group policy backup component for automatically backing up each modified policy in each domain, and a group policy backup manager component for backing up and restoring individual policies in a domain.
Abstract:
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site. If the directory site code does not correspond to a configured and allowed site, compliance with access requirements are enforced. Enforcement actions can include a forced logoff of the computer system user, and/or a forced shutdown of the computer system.
Abstract:
Certain aspects of the present disclosure relates to processing functionality of a Configuration Manager Computer Association Tool (CMCA) to an Operating System Deployment (OSD) computer association process. The disclosure includes processing the Operating System Deployment (OSD) functionality of a Microsoft System Center Configuration Manager (SCCM) to configure a server, wherein the OSD causes the server to a Pre-boot Execution Environment (PXE Boot). The SCCM may be launched for the PXE boot process to be associated with the server and configure the SCCM to associate with a specific OSD Task Sequence. Boot from a Network Interface Card (NIC) that has an associated MAC address, using the PXE, wherein the PXE boot process then hands the operation over to the designated OSD Task Sequencer (TS) which handles the configuration process according to at least one variable.
Abstract translation:本公开的某些方面涉及将配置管理器计算机关联工具(CMCA)处理到操作系统部署(OSD)计算机关联过程的功能。 本公开包括处理Microsoft System Center Configuration Manager(SCCM)的操作系统部署(OSD)功能以配置服务器,其中OSD使服务器进入预引导执行环境(PXE引导)。 可以启动SCCM以使PXE启动过程与服务器相关联,并将SCCM配置为与特定OSD任务序列相关联。 使用PXE从具有关联MAC地址的网络接口卡(NIC)引导,其中PXE启动过程然后将操作转移到根据至少一个变量处理配置过程的指定OSD任务排序器(TS),该任务排序器 。
Abstract:
A method, system and program product for printer driver management in an enterprise network. Each requested printer driver is tested in a controlled environment to determine if the driver is compatible with at least one other driver in a set of drivers. The tested printer driver is conditioned for inclusion in a central repository that stores a plurality of sets of versioned drivers, if the printer driver is determined to be compatible. The tested driver and at least one associated file are packaged and stored in the central repository. The tested driver and associated file are deployed to at least one server hosting a distributed file share. The tested driver and associated file are downloaded to at least one print server. Driver files are touched with a date and time stamp so that workstations will automatically download updated printer drivers from the print server.
Abstract:
A method, system, and computer program product for detecting and enforcing compliance with access requirements for a computer system in a restricted computer network. A compliance validation configuration file is created for the computer system. A maintenance service utility is configured to launch a compliance validation executable file at a specified time during operation of the computer system. A digital hash is generated for the compliance validation executable file and for the compliance validation configuration file. A determination is made if the computer system or a computer system user is a member of a configured restricted group. If the computer system or the computer system user is a member of a configured restricted group, a determination is made if a directory site code for a subnet of the restricted computer network to which the computer system is connected corresponds to a configured and allowed site. If the directory site code does not correspond to a configured and allowed site, compliance with access requirements are enforced. Enforcement actions can include a forced logoff of the computer system user, and/or a forced shutdown of the computer system.
Abstract:
A method, system and program product for printer driver management in an enterprise network. Each requested printer driver is tested in a controlled environment to determine if the driver is compatible with at least one other driver in a set of drivers. The tested printer driver is conditioned for inclusion in a central repository that stores a plurality of sets of versioned drivers, if the printer driver is determined to be compatible. The tested driver and at least one associated file are packaged and stored in the central repository. The tested driver and associated file are deployed to at least one server hosting a distributed file share. The tested driver and associated file are downloaded to at least one print server. Driver files are touched with a date and time stamp so that workstations will automatically download updated printer drivers from the print server.
Abstract:
Certain aspects of the present disclosure relates to processing managing an operating system to set up a computer association tool. The technique includes processing an Operating System Deployment (OSD) functionality of a Microsoft System Center Configuration Manager (SCCM) to configure a server, wherein the OSD causes the server to a Pre-boot Execution Environment (PXE Boot). The SCCM may be launched for the PXE boot process to be associated with the server and configuring the SCCM to associate with a specific OSD Task Sequence. Boot from a Network Interface Card (NIC) that has an associated MAC address, using the PXE, wherein the PXE boot process then hands the operation over to the designated OSD Task Sequencer (TS) which handles the configuration process according to at least one variable.
Abstract translation:本公开的某些方面涉及管理操作系统以建立计算机关联工具的处理。 该技术包括处理Microsoft System Center Configuration Manager(SCCM)的操作系统部署(OSD)功能以配置服务器,其中OSD使服务器进入预启动执行环境(PXE引导)。 可以启动SCCM以使PXE启动过程与服务器相关联,并将SCCM配置为与特定OSD任务序列相关联。 使用PXE从具有关联MAC地址的网络接口卡(NIC)引导,其中PXE启动过程然后将操作转移到根据至少一个变量处理配置过程的指定OSD任务排序器(TS),该任务排序器 。
Abstract:
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.